A remote code execution vulnerability exists within Internet Explorer which may allow for a remote attacker to execute arbitrary code under the context of the logged in user. This vulnerability requires minimal user-interaction.
Internet Explorer 5.01
Internet Explorer 6
Local Code Execution
A web browser remote code execution vulnerability has a very high impact since the source of the malicious payload can be any site on the Internet. An even more critical problem is generated when clients are administrators on their local hosts, which would run the malicious payload with Administrator credentials.
BeyondTrust Prevention and Detection:
BeyondTrust's Blink® Personal Edition protects from this vulnerability.
BeyondTrust's Blink® Professional Edition protects from this vulnerability.
BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.
Microsoft Patch - MS06-013
Since this vulnerability is patched, the primary mitigation for this vulnerability would be to apply MS06-013. A third-party patch was also available from eEye Research, but eEye suggests the removal of this patch since the official Microsoft patch is now available. However, other mitigation is available by disabling active scripting for non-trusted sites as detailed in KB240797.
First Public PoC Code Disclosure (Non-Malicious Payload - Executes calc.exe)